exclusive
content

Datadog 2025 revenue forecast has been officially raised, driven by a strong first-quarter performance and surging demand for artificial intelligence and cloud-based security solutions. The company, known for its cloud monitoring and analytics tools, now expects annual revenue to reach between $3.22 billion and $3.24 billion—up from its previous guidance of $3.18 billion to $3.20 billion. This boost in outlook reflects not only solid sales but growing interest in Datadog’s expanding suite of AI-enabled products.

In Q1, Datadog posted $761.6 million in revenue, marking a 25% increase compared to the same period last year. The results easily beat Wall Street estimates, which stood at $741.5 million. The company also reported adjusted earnings per share of 46 cents, exceeding analyst expectations of 43 cents. Notably, Datadog saw a 13% year-over-year increase in high-spending customers, with more than 3,770 clients now contributing over $100,000 in annual recurring revenue—a strong signal of long-term enterprise commitment.

CEO Olivier Pomel attributed the growth to new feature rollouts, such as App Builder and On-Call, as well as steady demand for advanced security capabilities. Datadog is also deepening its investment in artificial intelligence through strategic moves like the recent acquisition of Eppo, a feature flagging and experimentation platform. This acquisition strengthens Datadog’s analytics infrastructure, enabling customers to deploy AI-powered experiments faster and more securely.

As AI continues to reshape enterprise operations, Datadog is positioning itself at the center of that transformation. The company’s focus on scalable, secure, and integrated tools is resonating with IT leaders navigating complex cloud environments. This improved forecast is more than a numbers bump—it’s a sign of confidence in Datadog’s vision and its growing role in the future of enterprise tech.

News Source: finance.yahoo.com

For deeper analysis and ongoing coverage of Datadog’s growth and the tech earnings landscape, visit SOC News.

In what security experts are describing as a “distributed crisis,” a staggering 90% of cybersecurity and IT leaders worldwide reported experiencing cyberattacks targeting their cloud environments within the past year.

This alarming statistic emerges from comprehensive research conducted across ten countries, highlighting the increasing vulnerability of organizations as they transition from on-premises systems to hybrid cloud infrastructures.

The study, which surveyed more than 1,600 IT and security leaders, reveals that despite increased investment in cloud security, threat actors continue to find success in breaching these environments.

The nature of cloud-targeted attacks has evolved dramatically, with adversaries shifting away from traditional malware-based approaches toward more sophisticated identity-based intrusion methods.

According to the research, malware-free activity now accounts for 79% of all detected intrusions, a significant increase from just 40% in 2019.

This paradigm shift reflects attackers’ adaptation to modern enterprise environments, where they increasingly exploit valid credentials, engage in hands-on-keyboard intrusions, and deploy social engineering tactics to bypass conventional security measures.

The impact of these breaches has been severe, with 86% of organizations that experienced ransomware attacks ultimately paying the demanded ransom to recover their data or halt the attack.

Even more concerning, 74% of victims reported that attackers were able to harm backup and recovery options, effectively eliminating safety nets designed to mitigate such incidents.

Rubrik Zero Labs researchers identified a particularly troubling trend in their analysis: the dramatic reduction in “breakout time” – the period between initial compromise and lateral movement across systems.

“In 2024, the average breakout time for interactive eCrime intrusions fell to 48 minutes, down from 62 minutes in 2023,” noted security analysts.

“Alarmingly, the fastest breakout was recorded at just 51 seconds, meaning defenders may have less than a minute to detect and respond before attackers establish deeper control”.

The Rise of Identity-Based Attack Vectors

The report provides detailed insight into how identity-based attacks have become the preferred method for cloud environment infiltration.

Rather than breaking in through security vulnerabilities, attackers are simply logging in using compromised credentials.

This approach proves particularly effective in cloud and SaaS environments where traditional perimeter defenses offer limited protection.

Valid account abuse was responsible for 35% of cloud-related incidents, reflecting attackers’ growing focus on identity compromise as a gateway to broader enterprise environments.

Microsoft’s security telemetry supports this finding, revealing that they block over 600 million identity-based attacks daily.

These attacks typically begin with credential harvesting through phishing campaigns or purchase of stolen credentials from access brokers, whose activity surged by nearly 50% compared to the previous year.

Stay updated with SOC News for cutting-edge security innovations and expert industry insights! 

Source: https://cybersecuritynews.com/cybersecurity-leaders-encountered-cyberattacks/

Hewlett Packard Enterprise has announced an expansion of its HPE Aruba Networking and HPE GreenLake cloud offerings to support enterprises in enhancing secure connectivity and hybrid cloud operations.

New capabilities now available in HPE Aruba Networking Central include cloud-based access control security designed to accelerate enterprise-grade zero trust security. This approach treats every user, device, and application as a potential threat until verified, employing robust policy capabilities to strengthen protection measures. Additionally, HPE Private Cloud Enterprise introduces threat-adaptive security features to support compliance with the Digital Operations Resilience Act (DORA), offering the capability to disconnect from the public internet when a network threat is detected.

Phil Mottram, Executive Vice President and General Manager, HPE Aruba Networking, commented on the evolving cyber threat landscape and the need for advanced security: “With the rise in adoption of data-fueled AI applications, organisations are facing more sophisticated threats to anywhere data is stored, captured or transmitted. HPE’s security solutions deliver advanced protection to help organisations mitigate risk, defend against attacks and build resiliency.”

The new features in HPE Aruba Networking Central Network Access Control (NAC) include precision cloud-based access controls, enabling IT teams to define and implement role-based policies for user and device identification. These enhancements are designed to help enterprises advance universal zero trust network access initiatives. Additional features, such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), AI-powered observability, and microsegmentation, are aimed at reducing the impact of potential security breaches.

Among the new security functionalities are the Enhanced Policy Manager for HPE Aruba Networking Central NAC, which establishes detailed network access policies—such as application-to-role, role-to-subnet, and role-to-role policies. This ensures consistent enforcement of security and compliance across edge-to-cloud networks.

Integration between HPE Aruba Networking Central and HPE OpsRamp has been strengthened to provide native monitoring of third-party devices from vendors like Cisco, Arista, and Juniper Networks. Enhanced application profiling, classification, and risk assessment tools now give enterprises the capacity to establish application-specific access policies based on risk criteria.

Updates to HPE Aruba Networking EdgeConnect SD-WAN bring new Secure Access Service Edge (SASE) integration and Adaptive Distributed Denial-of-Service (DDoS) defence capabilities. These use machine learning to dynamically adjust DDoS protections in real time. All Zero Trust Network Access (ZTNA) customers now receive a complimentary licence for HPE Aruba Networking Private Edge.

HPE Aruba Networking SSE offers new high-availability and high-performance mesh connectivity for routing traffic between global points of presence, aiming to improve reliability and resiliency. Mesh connectivity automatically determines the fastest secure path for data, providing alternative routes and automatic recovery to ensure continued security, without requiring manual intervention by IT teams.

On the private cloud front, HPE GreenLake receives further security enhancements intended to protect against emerging threats and to support compliance with new regulations. HPE Private Cloud Enterprise now features threat-adaptive security, capable of temporarily isolating critical systems by disconnecting from the public internet when a threat is detected. This function acts as a “digital circuit breaker” and is designed to minimise impacts before securely reconnecting systems once the threat is resolved. These features specifically address requirements for regulated industries, including the financial sector, under DORA.

HPE also announced the general availability of air-gapped cloud management through HPE Private Cloud Enterprise. This service enables customers in regulated industries or government to manage private cloud infrastructure entirely on-premises, without any external connectivity, and is deployed by security-cleared HPE staff. Future enhancements will allow cloud-native and Kubernetes workloads to be managed with the same air-gapped approach.

Additional offerings include HPE Cybersecurity Services for sovereign cloud, providing expertise to integrate sovereign security solutions into an organisation’s risk management framework. New cybersecurity services focused on AI aim to give customers governance and compliance support while transforming operations to predict and counter both traditional and AI-driven threats.

The integration between HPE’s OpsRamp and CrowdStrike provides unified observability and real-time threat detection, designed to enhance performance and resilience for enterprise systems.

HPE’s announcement comes as the company marks a year since signing the CISA Secure by Design pledge. HPE reports that it deploys more than 2,200 security controls within HPE GreenLake, and utilises Zero Trust frameworks to meet requirements set by CIS, CISA Secure by Design, STIG, and DORA.

Other advancements in HPE’s secure by design initiatives include Aruba Networking’s AI-based network detection and response (NDR), ransomware protection through the HPE Cyber Resilience Vault, and the introduction of the HPE ProLiant Compute Gen12 portfolio with HPE Integrated Lights Out 7. The new servers also provide a silicon root of trust and feature post-quantum cryptography capabilities meeting FIPS 140-3 Level 3 security certification.

Stay updated with SOC News for cutting-edge security innovations and expert industry insights! 

Source: https://datacentrenews.uk/story/hpe-unveils-enhanced-ai-powered-security-for-cloud-network

The zero-trust networking startup NetFoundry Inc. said today it has received its first cash injection from venture capitalists, raising $12 million in funding.

SYN Ventures was the sole participant in the round, and the cash will be used to help support the startup’s mission to simplify, secure and accelerate innovation in enterprise software.

NetFoundry is the creator of a cloud-native platform that’s used by enterprises to deploy and control high-performance zero-trust networks in the simplest way possible, without needing to set up or maintain any networking infrastructure.

The company says it has built a micro-segmented software-defined network that minimizes latency, packet loss and jitter, while providing “military-grade” security. It can be overlaid on top of any public internet connection, transforming networks into an on-demand software-as-a-service model. It’s used by companies to deploy new applications rapidly with embedded zero-trust network security.

Zero trust is a security framework that requires stringent verification for every user and device attempting to access an application or a resource, regardless of if they’re inside or outside of an organization’s network. Unlike traditional security models that rely on a defined network perimeter, zero-trust frameworks operate on the principle that no user or system should be trusted. As such, they require continuous authentication, authorization and verification in order to grant access to applications and data.

As more organizations shift their workloads and applications to public cloud infrastructure platforms, zero trust has become the standard security model. Enterprises have come to learn that traditional wide-area network models aren’t scalable, agile or secure enough for cloud computing, and that’s what NetFoundry is trying to capitalize on, helping them to embed zero trust directly into any application.

NetFoundry’s secure-by-design, network-as-code platform is based on the open-source zero-trust software framework OpenZiti, and it caters to both infrastructure providers and application builders. While businesses use it to secure any connected app or workflow across any network, infrastructure providers take advantage of its cloud-native, network-as-a-service model to embed zero trust within their own services.

Stay updated with SOC News for cutting-edge security innovations and expert industry insights! 

Source: https://siliconangle.com/2025/04/28/netfoundry-raises-12m-bring-secure-zero-trust-networking-cloud-applications/